<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>irchaos.club</title>
    <link>https://irchaos.club</link>
    <description>Latest posts from irchaos.club</description>
    <lastBuildDate>Mon, 16 Mar 2026 22:46:09 GMT</lastBuildDate>

  <item>
    <title>Analyzing the Midnight Blizzard Eviction Plan</title>
    <link>https://irchaos.club/analyzing-the-midnight-blizzard-eviction-plan</link>
    <guid isPermaLink="true">https://irchaos.club/analyzing-the-midnight-blizzard-eviction-plan</guid>
    <pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate>
    <author>cauliflowerdoughnuts</author>
    <category>incident response</category><category>cloud</category><category>azure</category>
    <description><![CDATA[A hands-on walkthrough of rebuilding the Midnight Blizzard OAuth attack chain in Azure and developing an eviction plan for it.]]></description>
  </item>

  <item>
    <title>Browser Hijacking: Three Technique Studies</title>
    <link>https://www.gdatasoftware.com/blog/2025/11/38298-learning-about-browser-hijacking</link>
    <guid isPermaLink="true">https://www.gdatasoftware.com/blog/2025/11/38298-learning-about-browser-hijacking</guid>
    <pubDate>Wed, 10 Dec 2025 00:00:00 GMT</pubDate>
    <author>GData, Karsten Hahn</author>
    <category>reverse engineering</category><category>malware</category>
    <description><![CDATA[If you are searching for technical information on how browser hijacking works, some generic removal instructions is all you'll probably find. Let's change that.]]></description>
  </item>

  <item>
    <title>Analyzing the unsafe chroot behavior of sudo CVE-2025-32463</title>
    <link>https://skyblue.team/posts/unsafe-chroot/</link>
    <guid isPermaLink="true">https://skyblue.team/posts/unsafe-chroot/</guid>
    <pubDate>Mon, 03 Nov 2025 00:00:00 GMT</pubDate>
    <author>airbus-cert, dolphino</author>
    <category>kev</category><category>ebpf</category><category>sudo</category><category>threat hunting</category>
    <description><![CDATA[A story of a bee, a sandwich and a crab]]></description>
  </item>

  <item>
    <title>Graph Api Overwhelm</title>
    <link>https://www.alphaf0x.com/posts/graph-api/</link>
    <guid isPermaLink="true">https://www.alphaf0x.com/posts/graph-api/</guid>
    <pubDate>Sun, 02 Nov 2025 00:00:00 GMT</pubDate>
    <author>alphaf0x</author>
    <category>graphapi</category><category>microsoft</category><category>cloud</category>
    <description><![CDATA[Guide to understanding, ingesting, and leveraging Microsoft Graph API Activity logs for security operations and detection engineering.]]></description>
  </item>

  <item>
    <title>Darkgate 3: Return of the Temp</title>
    <link>https://irchaos.club/darkgate-3-return-of-the-temp</link>
    <guid isPermaLink="true">https://irchaos.club/darkgate-3-return-of-the-temp</guid>
    <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
    <author>grepStrength</author>
    <category>rem</category><category>malware analysis</category><category>darkgate</category><category>loader</category><category>autoit</category>
    <description><![CDATA[Analyzing the prolific malware loader that loves AutoIt.]]></description>
  </item>

  <item>
    <title>Digging into Windows Defender Detection History (WDDH)</title>
    <link>https://www.orangecyberdefense.com/global/blog/cybersecurity/digging-into-windows-defender-detection-history-wddh</link>
    <guid isPermaLink="true">https://www.orangecyberdefense.com/global/blog/cybersecurity/digging-into-windows-defender-detection-history-wddh</guid>
    <pubDate>Sat, 18 Oct 2025 00:00:00 GMT</pubDate>
    <author>cyberdefense</author>
    <category>windows</category><category>forensics</category><category>tools</category>
    <description><![CDATA[Reverse engineering Windows Defender Detection History (WDDH) files to understand their binary structure and develop a Python parsing tool. Covers methodology from identifying data sources in MsMpEng.exe to creating a standalone CLI parser for DFIR investigations.]]></description>
  </item>

  <item>
    <title>Dameware Remote Everywhere Log Reference</title>
    <link>https://blog.dingusxmcgee.com/blog/2025/10/13/Dameware-Remote-Everywhere-Log-Reference.html</link>
    <guid isPermaLink="true">https://blog.dingusxmcgee.com/blog/2025/10/13/Dameware-Remote-Everywhere-Log-Reference.html</guid>
    <pubDate>Mon, 13 Oct 2025 00:00:00 GMT</pubDate>
    <author>dingusxmcgee</author>
    <category>incident response</category><category>rmm</category><category>dameware</category>
    <description><![CDATA[A reference document style blog covering Dameware Remote Everywhere rmm tool and its features from an incident response perspective.]]></description>
  </item>

  <item>
    <title>Desired State Configurations</title>
    <link>https://mashtitle.com/2025/10/13/desired-state-configurations/</link>
    <guid isPermaLink="true">https://mashtitle.com/2025/10/13/desired-state-configurations/</guid>
    <pubDate>Mon, 13 Oct 2025 00:00:00 GMT</pubDate>
    <author>smashtitle</author>
    <category>powershell</category><category>infrastructure</category>
    <description><![CDATA[Practical tour of DSC v1.1–v3.1: a PowerShell example, Azure Machine Configuration gotchas/deprecations, and a concise feature matrix—plus notes from building a Terraform-provisioned Windows detection lab.]]></description>
  </item>

  <item>
    <title>Opened a Can of XWorms</title>
    <link>https://grepstrength.dev/opened-a-can-of-xworms-33fde9d2aee6</link>
    <guid isPermaLink="true">https://grepstrength.dev/opened-a-can-of-xworms-33fde9d2aee6</guid>
    <pubDate>Mon, 29 Sep 2025 09:05:43 GMT</pubDate>
    <author>grepstrength</author>
    <category>rem</category><category>malware analysis</category><category>xworm</category><category>rat</category><category>backdoor</category><category>persistence</category><category>process injection</category>
    <description><![CDATA[Persistence Personified]]></description>
  </item>

  <item>
    <title>Scavenger Malware Distributed via num2words PyPI Supply Chain Compromise</title>
    <link>https://invokere.com/posts/2025/07/scavenger-malware-distributed-via-num2words-pypi-supply-chain-compromise/</link>
    <guid isPermaLink="true">https://invokere.com/posts/2025/07/scavenger-malware-distributed-via-num2words-pypi-supply-chain-compromise/</guid>
    <pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate>
    <author>invokere</author>
    <category>threat hunting</category><category>reverse engineering</category><category>scavenger</category><category>pypi</category>
    <description><![CDATA[A brief report on the num2words PyPI supply-chain compromise that distributed Scavenger malware. It details how a malicious update (v0.5.15 and v0.5.16) injected Windows DLL-loading code into __init__.py, executing the Scavenger Loader which connects to new C2 servers, steals .pypirc credentials, and downloads stealer modules. Includes IoCs, C2 info, and credits to researchers who discovered and analyzed the breach.]]></description>
  </item>

  <item>
    <title>Install Linters, Get Malware - DevSecOps Speedrun Edition</title>
    <link>https://irchaos.club/install-linters-get-malware</link>
    <guid isPermaLink="true">https://irchaos.club/install-linters-get-malware</guid>
    <pubDate>Sun, 20 Jul 2025 00:00:00 GMT</pubDate>
    <author>humpty/tony, invokere</author>
    <category>reverse engineering</category><category>supply chain</category><category>npm</category><category>c++</category>
    <description><![CDATA[How Scavenger rode a compromised npm eslint-config-prettier: loader/stealer internals, anti-analysis + XXTEA C2, Chromium targeting, BeamNG ties, and actionable IOCs (with InvokeRE)]]></description>
  </item>

  <item>
    <title>Supper is served</title>
    <link>https://irchaos.club/supper-is-served</link>
    <guid isPermaLink="true">https://irchaos.club/supper-is-served</guid>
    <pubDate>Sun, 29 Jun 2025 00:00:00 GMT</pubDate>
    <author>humpty/tony</author>
    <category>threat hunting</category><category>reverse engineering</category><category>c</category><category>scavenger</category>
    <description><![CDATA[A deep dive into Supper (Interlock RAT) a fileless Windows backdoor linked to Vice Society clarifying public report errors and detailing its C2 protocol, encryption, self-deletion, and reverse shell behavior.]]></description>
  </item>

  <item>
    <title>Incident Response Checklist</title>
    <link>https://mashtitle.com/2025/06/01/incident-response-checklist/</link>
    <guid isPermaLink="true">https://mashtitle.com/2025/06/01/incident-response-checklist/</guid>
    <pubDate>Sun, 01 Jun 2025 00:00:00 GMT</pubDate>
    <author>smashtitle</author>
    <category>helpers</category><category>incident response</category>
    <description><![CDATA[Windows-focused IR checklist mapping key Event IDs to ATT&CK/Kill Chain stages, with GFM checkboxes for triage and a downloadable HTML version—note the latest lives on GitHub.]]></description>
  </item>

  <item>
    <title>Analyzing the RedTiger Malware Stealer</title>
    <link>https://irchaos.club/redtiger-malware</link>
    <guid isPermaLink="true">https://irchaos.club/redtiger-malware</guid>
    <pubDate>Sun, 16 Mar 2025 00:00:00 GMT</pubDate>
    <author>humpty/tony</author>
    <category>threat hunting</category><category>reverse engineering</category><category>python</category>
    <description><![CDATA[Analysis of RedTiger, a python based stealer that leverages Discord to exfiltrate credentials]]></description>
  </item>

  <item>
    <title>Dissecting a fresh BlankGrabber sample</title>
    <link>https://irchaos.club/dissecting-blankgrabber</link>
    <guid isPermaLink="true">https://irchaos.club/dissecting-blankgrabber</guid>
    <pubDate>Sat, 15 Feb 2025 00:00:00 GMT</pubDate>
    <author>humpty/tony</author>
    <category>reverse engineering</category><category>python</category>
    <description><![CDATA[Analysis of BlankGrabber, a python based stealer]]></description>
  </item>

  <item>
    <title>Threat hunting for shits and giggles</title>
    <link>https://irchaos.club/threat-hunting-for-giggles</link>
    <guid isPermaLink="true">https://irchaos.club/threat-hunting-for-giggles</guid>
    <pubDate>Thu, 28 Nov 2024 00:00:00 GMT</pubDate>
    <author>humpty/tony</author>
    <category>threat hunting</category><category>reverse engineering</category><category>dotnet</category>
    <description><![CDATA[Analyzing XWorm and tracking related infrastructure with hunt.io]]></description>
  </item>

  <item>
    <title>Automating Qakbot Malware Analysis with Binary Ninja</title>
    <link>https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/</link>
    <guid isPermaLink="true">https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/</guid>
    <pubDate>Wed, 21 Feb 2024 00:00:00 GMT</pubDate>
    <author>invokere</author>
    <category>reverse engineering</category><category>c</category><category>qakbot</category>
    <description><![CDATA[A deep dive into Supper (Interlock RAT) a fileless Windows backdoor linked to Vice Society clarifying public report errors and detailing its C2 protocol, encryption, self-deletion, and reverse shell behavior.]]></description>
  </item>
  </channel>
</rss>
